Static task
static1
Behavioral task
behavioral1
Sample
dc18e3ce9617f6014a480a246a9ed908020261ba1ad6ef87d395c048289acd59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc18e3ce9617f6014a480a246a9ed908020261ba1ad6ef87d395c048289acd59.exe
Resource
win10v2004-20220812-en
General
-
Target
dc18e3ce9617f6014a480a246a9ed908020261ba1ad6ef87d395c048289acd59
-
Size
132KB
-
MD5
68d9a9eaf86704ae8ceb20470498c801
-
SHA1
79ba3a74053c2b93ff0557ed561f16e239453cdd
-
SHA256
dc18e3ce9617f6014a480a246a9ed908020261ba1ad6ef87d395c048289acd59
-
SHA512
8138ec8a2eb36d4e2ff9bd1b3cea39734e2a8fb2f59a1426924b51a1e1559afb9948896b852f0c178de74d9b4cac37240e1a9156abdd44e2fb2a7bd9eba460da
-
SSDEEP
3072:yJZftVEkHLYjpoqnGJtlFpTOcRUG5kaT1GWHnmrScPGoM:yJyaYjPnmtlF1OwUupEWHLoM
Malware Config
Signatures
Files
-
dc18e3ce9617f6014a480a246a9ed908020261ba1ad6ef87d395c048289acd59.exe windows x86
45249672161f817a0594a33bd6d86e10
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hprbutil
??0CHPRBWinOS@@QAE@XZ
?IsWindows@CHPRBWinOS@@QBEHK@Z
??1CHPRBWinOS@@UAE@XZ
??0CHPRBReg@@QAE@XZ
?GetDwordValue@CHPRBReg@@QAEJPBDPAK0@Z
kernel32
GetModuleFileNameA
InterlockedIncrement
GetShortPathNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
GetCommandLineA
GetCurrentProcess
GetCurrentThread
CreateSemaphoreA
GetCurrentProcessId
ReleaseSemaphore
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
lstrcmpiA
GetCurrentThreadId
InterlockedCompareExchange
InterlockedExchange
InterlockedDecrement
lstrcpyA
EnterCriticalSection
SetEvent
LeaveCriticalSection
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
WaitForMultipleObjects
WaitForSingleObject
ReleaseMutex
CloseHandle
SignalObjectAndWait
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
CreateMutexA
CreateThread
FlushFileBuffers
SetFilePointer
lstrcatA
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
HeapSize
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
GetModuleHandleA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
user32
CharNextA
MessageBoxA
GetMessageA
DispatchMessageA
PostThreadMessageA
LoadStringA
advapi32
InitializeSecurityDescriptor
GetTokenInformation
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
SetSecurityDescriptorDacl
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CreateServiceA
RegDeleteValueA
RegSetValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerA
OpenServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ole32
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitializeSecurity
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
oleaut32
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VarUI4FromStr
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SysStringByteLen
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VariantClear
VariantInit
SysAllocString
VariantCopyInd
VariantChangeType
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.grdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE